Jboss EAP

The JBoss Enterprise Application Platform is a subscription-based/open-source Java EE-based application server runtime platform used for building deploying and hosting highly-transactional Java applications and services developed and maintained by Red Hat

Severity Summary:

Critical: 34 High: 77 Medium: 101 Low: 16
Reference
Title
Severity
Jboss EAP Deserialization of Untrusted Data Vulnerability
Critical
Jboss EAP Permissions Privileges and Access Controls Vulnerability
Critical
Jboss EAP Deserialization of Untrusted Data Vulnerability
Critical
Jboss EAP Deserialization of Untrusted Data Vulnerability
Critical
Jboss EAP Deserialization of Untrusted Data Vulnerability
Critical
Jboss EAP Improper Restriction of XML External Entity Reference Vulnerability
Critical
Jboss EAP Deserialization of Untrusted Data Vulnerability
Critical
Jboss EAP Deserialization of Untrusted Data Vulnerability
Critical
Jboss EAP Deserialization of Untrusted Data Vulnerability
Critical
Jboss EAP Deserialization of Untrusted Data Vulnerability
Critical
Jboss EAP Improper Restriction of XML External Entity Reference Vulnerability
Critical
Jboss EAP Vulnerability
Critical
Jboss EAP Improper Control of Generation of Code (Code Injection) Vulnerability
Critical
Jboss Deserialization of Untrusted Data Vulnerability
Critical
Jboss EAP Vulnerability
Critical
Jboss EAP Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Critical
Jboss EAP Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Critical
Jboss EAP Deserialization of Untrusted Data Vulnerability
Critical
Jboss EAP Vulnerability
Critical
Jboss EAP Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Critical
Jboss EAP Deserialization of Untrusted Data Vulnerability
Critical
Jboss EAP Deserialization of Untrusted Data Vulnerability
Critical
Jboss EAP Deserialization of Untrusted Data Vulnerability
Critical
Jboss EAP Insertion of Sensitive Information into Log File Vulnerability
Critical
Jboss EAP Incomplete List of Disallowed Inputs Vulnerability
Critical
Jboss EAP Improper Restriction of XML External Entity Reference Vulnerability
Critical
Jboss EAP Deserialization of Untrusted Data Vulnerability
Critical
Jboss EAP Inadequate Encryption Strength Vulnerability
Critical
Jboss EAP Deserialization of Untrusted Data Vulnerability
Critical
Jboss EAP Deserialization of Untrusted Data Vulnerability
Critical